What We Do
How we do it
Resources
SECURITY ADVISORIES
Oct 18, 2021
Grief Ransomware Gang Claims 41 New Victims, Targeting Manufacturers; Municipalities; & Service Companies in U.K. & Europe
Grief Operators Earned an Estimated 8.5 Million British Pounds in Four Months Key Findings: The Grief Ransomware Gang (a rebrand of the DoppelPaymer Ransomware Group) claims to have infected 41 new victims between May 27, 2021—Oct. 1, 2021 with their ransomware.Over half the companies listed on Grief’s underground leak site are based in the U.K. and Europe. The Grief Ransomware Gang appears to…
Read More
View all Advisories →
Company
ABOUT eSENTIRE
About Us
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 1000+ organizations in 70+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
Read about how we got here
Leadership Work at eSentire
LATEST PRESS RELEASE
Oct 12, 2021
eSentire Launches MDR with Microsoft Azure Sentinel Extending Response Capabilities Across Entire Microsoft Security Ecosystem
Waterloo, ON – Oct. 12, 2021 -- eSentire, recognized globally as the Authority in Managed Detection and Response (MDR), today announced the expansion of its award-winning MDR services with Microsoft Azure Sentinel, as part of its integration with the complete Microsoft 365 Defender and Azure Defender product suites supporting Microsoft SIEM, endpoint, identity, email and cloud security services.…
Read More
Partners
PARTNER PROGRAM
Partners
Our award-winning partner program offers financial rewards, sales and marketing tools and personalized training. Accelerate your business and grow your revenue by offering our world-class Managed Detection and Response (MDR) services.
Learn about our Partner Program
PARTNER RESOURCES
Apply today to partner with the Authority in Managed Detection and Response.
Login to the Partner Portal for resources and content for current partners.
Search
Resources
Blog — Dec 22, 2017

What's trending in cybersecurity: expectations for the new year

2017 has been a busy year for cybersecurity. Between massive data breaches including Verizon, Equifax, Sonic, Uber and the infamous “Paradise Papers”; ransomware variants like Wannacry, NotPetya, Locky, GoldenEye and Jigsaw; and data leaks from major players including the US Air Force’s security clearances, several of the CIA’s confidential documents, and the records of Californian voters, it seems all anyone is talking about is compromised data and security regulations. From healthcare to legal to finance, no industry has come through the year unscathed by cyberattacks and threats.

So, what’s next for cybersecurity? Cybersecurity experts discuss predictions, trends, and what to expect in 2018.

More targeted, vindictive attacks

According to Mark Sangster, VP of marketing at eSentire, cybercriminals will likely begin to “move from opportunistic and transactional attacks (for example, generic emails with cryptolocker) to more targeted (industry or firm focused) attacks.” This could lead to cybercriminals:

Director of Threat Intelligence at eSentire, Viktors Engelbrehts, added, “Politically motivated and cyber espionage cyber-attacks against the critical infrastructure industry will continue to increase…There is also the potential for loss of human life as a result of targeted cyber-attacks, especially in the healthcare sector.”

More large-scale cybercrime

Opportunistic cybercrime will continue to rely on specific malware types, likely investing in capabilities to cause a rapid and global expansion of the infected surface.

According to Engelbrehts, “Such capabilities can also be used for politically-motivated attacks.”

However, “This assessment may change depending on Law Enforcement (LE) agencies’ abilities to deter cybercrime, prosecute individual criminals, and proactively disrupt malware infrastructure in a coordinated fashion,” he added.

At an individual level, further exposure of personal information coupled with a general lack of user awareness and ongoing data collection initiatives run by private organizations will worsen a user’s overall exposure to attack.

“Such [personal] information will remain highly valuable to cybercriminals and will likely continue to be used to facilitate fraudulent activities on a global scale,” said Engelbrehts.

More attention on IoT and cloud security

IOT will turn to the darkside. We will see many more and expanded attacks coming from IOT devices, both from DDoS attacks and entry points into enterprise networks,” said Joe Rogalski, Director of Solutions Engineering at eSentire.

This will be further demonstrated by an overall false sense of security in the cloud.

“Small and medium enterprises will continue the move to cloud more than ever but will falsely trust that their data is protected by the provider, failing to realize that the end-users and endpoint machines will be targeted to compromise the cloud resources as legitimate users,” he added.

Eldon Sprickerhoff, Chief Security Strategist and Founder at eSentire, also predicted, “The SSO solutions released by major cloud vendors (Amazon, Google, Microsoft) will eviscerate the market for stand-alone solutions.”

More cryptocurrency attacks

Principal Security Strategist at eSentire, Bill Weber, stated, “Business will continue to experience financial losses as they move to adopt cryptocurrency technology without appropriate security controls, creating new markets for trusted providers of crypto-economic business transactions.”

“Successful cryptocurrency attacks will splash headlines—” added Sprickhoff, “—from purely fraudulent ICO's and DoS attacks against crypto-exchanges to accretive vulnerabilities within the codebase itself and focused attacks against software wallets.”

More regulations and stricter compliance

According to Weber, “Government regulatory agencies and business partners will continue moving toward adopting and enforcing financial and criminal liabilities for cybersecurity negligence.”

The fact is, with the influx of data breaches over the past two years, businesses will have to take the necessary steps to meet the increasing number of cybersecurity requirements set forth by regulatory bodies.

Sangster predicts regulators will begin to treat ransomware payments like a breach, requiring declarations and reporting, which will in turn discourage firms from paying. It’s also likely regulators will move to prevent cryptocurrency payments for ransomware.

“In the short-term companies will suffer, but eventually the industry will be better for it,” said Sangster. “Eventually criminals will learn that an industry can’t pay and will move on to the next.”

GDPR

Furthermore, in 2018, the EU will begin to fine midmarket firms that violate GDPR regulations, “…making a lesson out of them,” added Sangster.

As a result, “the GDPR will spur corporations worldwide to heighten their privacy measures widely, ahead of what extra-legislative bodies may propose,” said Sprickerhoff.

NIST

When it comes to the National Institute of Standards and Technology (NIST), Steven Legg, Principle Security Strategist at eSentire, predicts that “there will only continue to be an increased focus on identifying and addressing cybersecurity requirements in a foundational, outcome-focused fashion.”

Currently, much of the proposed NIST CSF draft update focuses on how to customize the framework for maximum benefit while retaining work performed on older versions of the CSF.

“This will influence guidance, requirements, and coaching provided by 3rd party experts as well as regulators looking to provide more specific direction and guidance on meeting provided mandates,” added Legg.

Prepare for 2018

After the cyber-disasters of 2017, it’s more important than ever businesses finalize their cybersecurity plans for 2018. Cybercriminals won’t wait for you to get organized – they’ll attack whether you’re ready or not.

With a general sense of what you might expect, you can devise strategies that will protect you from a number of different cyber-attacks. Don’t know where to start? We can help. With Managed Detection and Response you can rest easy knowing you won’t become just another victim in 2018.

Emily Boden
Emily Boden Content Specialist

Emily is a content specialist on the Marketing team at eSentire. Drawing on her background in journalism and social media, Emily communicates eSentire's mission with compelling and thought-provoking content.